Active Bibliography

20 Recent progress and prospects for integer factorisation algorithms – Richard P. Brent - 2000
23 Information and Computation: Classical and Quantum Aspects – A. Galindo, M. A. Martín-delgado - 2001
1 Computational Methods in Public Key Cryptology – Arjen K. Lenstra - 2002
1 Public Key Cryptosystems using Elliptic Curves – J. Borst - 1997
Cryptographic Primitives – Paul Garrett - 2007
46 New Public-Key Schemes Based on Elliptic Curves over the Ring Z_n – Kenji Koyama, Ueli M Maurer, Tatsuaki Okamoto, Scott A Vanstone - 1991
5 On The Oracle Complexity Of Factoring Integers – Ueli M. Maurer - 1996
Équipe CAIRN- ENSSAT et L’École Politechnique de Silésie à Gliwice – Thèse Université, De Rennes, Docteur De, L’université De Rennes, Danuta Pamula, Électronique Et Informatique, Aleksander Nawrat, Liam Marnane, Romuald Rocher, Arnaud Tisserand, Edward Hrynkiewicz, Danuta Pamuła - 2012
5 Efficient Algorithms for Implementing Elliptic Curve Public-Key Schemes – Dan Beauregard - 1996
10 Elliptic & hyperelliptic curves on embedded µp – Thomas Wollinger, Jan Pelzl, Volker Wittelsberger
17 Factorization of the tenth and eleventh Fermat numbers – Richard P. Brent - 1996
An Analysis of Certain Cryptosystems . . . – Michael James De Mare - 2004
An Analysis of Certain . . . – Michael James De Mare - 2004
26 The Diffie-Hellman Protocol – Ueli M. Maurer, Stefan Wolf - 1999
38 The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms – Ueli M. Maurer , Stefan Wolf - 1998
4 Decoherence, Control and Symmetry in Quantum Computers – Dave Morris Bacon, Dave Morris Bacon, Dave Morris Bacon - 2001
9 Implementation Of The Atkin-Goldwasser-Kilian Primality Testing Algorithm – François Morain - 1988
Crypto Topics and . . . – Jennifer Seberry, Chris Charnes, Josef Pieprzyk, Rei Safavi-Naini
9 On the importance of securing your bins: The garbage-man-in-the-middle attack – Marc Joye, Jean-Jacques Quisquater - 1997